You are here

Addressing a new era in security: how to protect your business from the inside out

Addressing a new era in security: how to protect your business from the inside out

Addressing a new era in security: how to protect your business from the inside out

(BPT)

(BPT) - During the first 43 days of 2014, the Identity Theft Resource Center said 91 data breaches were reported by companies across the country, and the full list doesn’t just show household names of big brand retailers – many of these companies were small businesses, family medical practices or local restaurants that never thought they’d be cybercrime victims. For instance, the most high profile breach of 2013 – Target – was actually set into motion when one of its much smaller regional contractors was hacked.

Undoubtedly, businesses of all sizes are potential targets for cyber criminals, but while the “big boys” often have the financial means to rebound relatively quickly, for small business owners, one attack can mean life or death for the future of their business. In fact, according to the National Small Business Association, a single cyber-attack costs a small business an average of $8,000 to recover from (and this figure does not include the incalculable damage done to the company’s reputation).

Historically, small business owners have focused their security prevention on their physical domains, but, with the lines between physical and digital security having blurred over the last decade, it’s critical for small business owners to rethink their 21st century security strategies.

ADT offers these helpful tips for small business owners in order to more effectively protect themselves, their assets, and their loyal customers from the wide range of physical and digital threats:

* Make sure your employees are informed. Whether you’re concerned about digital security or physical security, your employees are your first line of defense. Your employees should be up to date on all company security measures and aware of the vulnerable digital and physical areas in your business. Keeping them informed ensures they know how to protect your business and alert you should a problem arise.

* Increase the strength of your passwords. Creating strong passwords may at first be inconvenient for you and your staff, but stronger passwords can greatly improve the security of your business. Using your name or the company’s name or address will not deter a hacker for long, but complex passwords have a significantly greater chance of tripping up hackers.

* Improve the traditional security system. A security system is a must for a business of any size, and an interactive solution like ADT Pulse can help mitigate threats with all-in-one security and automation capabilities that combine video surveillance with activity-triggered alerts. This allows you the freedom to monitor and control your business with a web-enabled device from any location.

* Erase old hard drives. You’ve heard the saying “One man’s trash is another man’s treasure,” and that is certainly true when it comes to old hard drives. While your business may not have any use for these outdated systems, the information stored on the hard drive is valuable to would-be criminals. Before you throw out that old computer or copy machine, be sure to erase the hard drive.

While many small business owners may think cyber criminals aren’t interested in businesses their size, the reality is small businesses require the same strategic physical and digital protection as major corporations, and following the above steps can help you to prevent the significant financial and reputational damage that comes with a security breach.

In order to learn more about how ADT can help protect your small business, visit ADT.com/business.

Comment section guidelines

The below comment section contains thoughts and opinions from users that in no way represent the views of the Las Vegas Review-Journal or Stephens Media LLC. This public platform is intended to provide a forum for users of reviewjournal.com to share ideas, express thoughtful opinions and carry the conversation beyond the article. Users must follow the guidelines under our Commenting Policy and are encouraged to use the moderation tools to help maintain civility and keep discussions on topic.